Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Introduction
00:00 • 2min
Web Security - What's Going on in the Cloud?
01:34 • 5min
How to Reduce Dependencies in Sophor?
06:57 • 2min
Using a Thousand Dependencies Is Just Absurd, Right?
09:15 • 4min
Javascript - Is There a Leadership in the Javascript Community?
13:33 • 2min
Id So Degree, What Did It Have to Be Compatible With?
16:02 • 4min
How to Define Trustworthy Authors
20:27 • 2min
Noed
22:29 • 2min
Is There More We Can Do to Automate This?
24:45 • 3min
Is There a Vulnerability?
28:03 • 5min
How to Find Known Malware Attacks
33:27 • 3min
Git
36:47 • 3min
Top End Devs - Slash Coaching
39:50 • 2min
Is There a Need for Two Factor Authentication?
41:37 • 2min
Can It Detect if You're Now Accessing the File System?
43:40 • 2min
Is There a Speck in a Package?
45:17 • 2min
How to Increase Your Installations With M P M
47:25 • 3min
Is It Gonna Be Like Two Po Gasts?
50:30 • 2min
Socket Dot Dev
52:22 • 2min
The Model's Complete? Is It a Top Level Dependency?
54:29 • 4min
I'm All in on This Dev Developer Tool, by the Way.
58:51 • 4min
I'll Drop a Link for That, if People Can Hear That Behind Me
01:02:53 • 3min
Is There a Socket Dot Pod?
01:05:56 • 2min
I'm in a Pick of Seven Wonders, as Is the Board Game This Week
01:08:01 • 4min
Dot Com Slash Conferences - What Are Your Picks?
01:11:51 • 4min